Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
When will the wave of POS data breaches that have been rocking American retail recently end? Not today, as retail giant Home Depot announced that they appear to have joined the parade of high profile victims of hackers. According to some reports, the Home Depot data breach could involve a massive compromise of cardholder data.
In a message addressed to its customers, posted on their corporate web site, the company said “We’re looking into some unusual activity that might indicate a possible payment data breach and we’re working with our banking partners and law enforcement to investigate”.
They also assured their customers that they will not be responsible for any fraudulent charges. “The financial institution that issued your card or Home Depot are responsible for those charges should we confirm a breach.”
The announcement came less than a day after the story was broken on the krebsonsecurity.com blog. Krebs wrote that his sources believe that Home Depot may the source of a “massive” amount of stolen credit and debit cards being offered for sale by cybercriminals. Data breaches are frequently discovered only by third parties, in this case banks investigating unusual account activity.
Krebs also states that this breach may involve the same Russian and Ukrainian hackers responsible for the data breaches at Target, Sally Beauty, P.F. Chang’s and many others.
If so, it means that the Home Depot breach may not be directly related to a string of high profile POS data breaches related to the Backoff POS malware, which had prompted a Homeland Security Warning on July 31st. The US Secret Service has reported that over 1,000 organizations have been victimized by Backoff, including the UPS Stores, Dairy Queen and 2 of the largest owners of supermarkets in the country.
ITSM Online
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP